21![Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin Alina Oprea Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin Alina Oprea](https://www.pdfsearch.io/img/ef8758a87cd06b56371d7defb4125cc4.jpg) | Add to Reading ListSource URL: www.zurich.ibm.comLanguage: English - Date: 2005-09-02 12:11:39
|
---|
22![Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg](https://www.pdfsearch.io/img/d23d106cb9a902698f2e62d59015a255.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2003-12-17 04:10:40
|
---|
23![Lecture 17 - Zero Knowledge Proofs Boaz Barak April 5, 2010 Review connections between: pseudorandom generators, one-way functions, pseudorandom functions, CPA secure symmetric encryption, message authentication codes, C Lecture 17 - Zero Knowledge Proofs Boaz Barak April 5, 2010 Review connections between: pseudorandom generators, one-way functions, pseudorandom functions, CPA secure symmetric encryption, message authentication codes, C](https://www.pdfsearch.io/img/b6c2a113f368e972f51c0c60d2d6ee10.jpg) | Add to Reading ListSource URL: www.cs.princeton.eduLanguage: English - Date: 2010-04-05 00:17:40
|
---|
24![Microsoft PowerPoint - 07-PPT Process Calculus.ppt Microsoft PowerPoint - 07-PPT Process Calculus.ppt](https://www.pdfsearch.io/img/63e3ad369e297310eae68c2e6fc9daf0.jpg) | Add to Reading ListSource URL: theory.stanford.eduLanguage: English - Date: 2005-01-07 00:42:30
|
---|
25![Curriculum Vitae Silvio Micali Ford Professor of Engineering Electrical Engineering and Computer Science Department Stata Center, Room G644, 32 Vassar Street, Cambridge, MA5949 Curriculum Vitae Silvio Micali Ford Professor of Engineering Electrical Engineering and Computer Science Department Stata Center, Room G644, 32 Vassar Street, Cambridge, MA5949](https://www.pdfsearch.io/img/4ab82b605ad88eb0505a11566dcf6bb1.jpg) | Add to Reading ListSource URL: people.csail.mit.eduLanguage: English - Date: 2015-04-22 20:29:48
|
---|
26![Abstract appearing in Proceedings of the 27th ACM Symposium on the Theory of Computing, MayIncremental Cryptography and Application to Virus Protection Mihir Bellare∗ Abstract appearing in Proceedings of the 27th ACM Symposium on the Theory of Computing, MayIncremental Cryptography and Application to Virus Protection Mihir Bellare∗](https://www.pdfsearch.io/img/92eadc71260264fd521c4210be3be451.jpg) | Add to Reading ListSource URL: cseweb.ucsd.eduLanguage: English - Date: 2004-08-02 17:51:17
|
---|
27![Security Flaws Induced by CBC Padding Applications to SSL, IPSEC, WTLS... Serge Vaudenay Swiss Federal Institute of Technology (EPFL) Security Flaws Induced by CBC Padding Applications to SSL, IPSEC, WTLS... Serge Vaudenay Swiss Federal Institute of Technology (EPFL)](https://www.pdfsearch.io/img/ac6035dd0b12b94cf48b402efdb159c4.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2007-08-30 18:34:48
|
---|
28![On the Impossibility of Sender-Deniable Public Key Encryption Dana Dachman-Soled? Microsoft Research New England Abstract. The primitive of deniable encryption was first introduced by Canetti et al. (CRYPTO, Denia On the Impossibility of Sender-Deniable Public Key Encryption Dana Dachman-Soled? Microsoft Research New England Abstract. The primitive of deniable encryption was first introduced by Canetti et al. (CRYPTO, Denia](https://www.pdfsearch.io/img/c92a6eb0414289b0953e91da3613655f.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2012-12-28 09:46:16
|
---|
29![Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff Jonathan Katz Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff Jonathan Katz](https://www.pdfsearch.io/img/0e4962e90e9b85f4eefb5154c6927586.jpg) | Add to Reading ListSource URL: www.cs.umd.eduLanguage: English - Date: 2014-05-16 05:57:05
|
---|
30![Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonkera,∗ , Sjouke Mauwa,b , Jun Panga a University of Luxembourg, Faculty of Sciences, Technology and Communication Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonkera,∗ , Sjouke Mauwa,b , Jun Panga a University of Luxembourg, Faculty of Sciences, Technology and Communication](https://www.pdfsearch.io/img/3547b8d2ad0d09c8341cb6b42f2d452e.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2013-09-25 07:33:00
|
---|